Learn more

CHINA INFORMATION TECHNOLOGY SECURITY EVALUATION CT

Overview
  • Total Patents
    31
  • GoodIP Patent Rank
    198,170
About

CHINA INFORMATION TECHNOLOGY SECURITY EVALUATION CT has a total of 31 patent applications. Its first patent ever was published in 2010. It filed its patents most often in China. Its main competitors in its focus markets computer technology, digital networks and it methods for management are BEIJING WANGPIN CONSULTATION CO LTD, BEIJING YUNZUJIA TECH CO LTD and DESIRE2LEARN INCORPORATED.

Patent filings in countries

World map showing CHINA INFORMATION TECHNOLOGY SECURITY EVALUATION CTs patent filings in countries
# Country Total Patents
#1 China 31

Patent filings per year

Chart showing CHINA INFORMATION TECHNOLOGY SECURITY EVALUATION CTs patent filings per year from 1900 to 2020

Top inventors

# Name Total Patents
#1 Wu Shizhong 13
#2 Zhang Lei 8
#3 Yi Jin 8
#4 Zhao Xianghui 8
#5 Liu Hui 8
#6 Liu Yanzhao 7
#7 Shizhong Wu 6
#8 Liu Lin 5
#9 Wu Runpu 5
#10 Lei Zhang 4

Latest patents

Publication Filing date Title
CN104580144A Penetration testing method for data transmission security of wireless data transmission radio
CN104462228A Semantics-based registration information security officer authentication capability evaluation method and system
CN104166680A Parallel vulnerability mining method based on open source library and text mining
CN105022677A USB device usage record recovery and check method
CN103886046A Automatic semanteme extraction method for Web data exchange
CN103701886A Hierarchic scheduling method for service and resources in cloud computation environment
CN103257872A Embedded control system for computers and updating method of embedded control system
CN103179132A Method and device for detecting and defending CC (challenge collapsar)
CN103218477A Network viewpoint propagation and forecasting method
CN103118138A Cloud service based message queue stream processing method
CN103268279A Compound poisson process-based software reliability prediction method
CN103198013A Loss-amount based software strong security measurement method
CN103049377A Parallel symbolic execution method based on path cluster reductions
CN102915347A Distributed data stream clustering method and system
CN102799954A Method and system for multi-objective optimization applied to risk assessment
CN102799822A Software running security measurement and estimation method based on network environment
CN102708054A Detection method for security flaws in loop write-only memory of binary program
CN102708153A Self-adaption finding and predicting method and system for hot topics of online social network
CN103366120A Bug attack graph generation method based on script
CN102411690A Safety loophole mining method and device of application software under Android platform